This pen-based, identity verification uses biometric technology. For use in commercial transactions at a point-of-sale terminal, a customer registers advising the system of a customer account that is to be used for payment. The customer also submits a digital signature for reference purposes—a fingerprint. The customer is then issued a transponder that links the customer to the customer account and to the reference digital signature. When the customer is at the point-of-sale terminal for making payment, an interrogator disposed at the point-of-sale terminal transmits a radio signal requesting identity verification. The transponder submits data to the interrogator. Thereafter, when the customer uses a stylus to submit written data (a signature), a sensor in the stylus makes incidental capture of biometric data that enables the interrogator to confirm customer identity. Similarly, at a security checkpoint in an office building, the system is utilized when a written log is used to track access and egress to the building. Again, a transponder is issued to a party having authorized access after the party has registered and submitted a digital signature for reference purposes.

Patent
   6925565
Priority
May 25 2001
Filed
May 25 2001
Issued
Aug 02 2005
Expiry
May 20 2023
Extension
725 days
Assg.orig
Entity
Small
147
7
EXPIRED
26. A system for use by a customer to conduct a commercial transaction, the customer being registered and linked with an account for payment, the system comprising:
a. a host computer having access to data that links the customer with the customer account;
b. an electronic device disposed at a point-of-sale terminal, the electronic device being digitally linked to the host computer; and
c. a stylus that is wireless, the stylus being carried by the customer, a stylus having at least one sensor, the sensor capturing a digital signature of the customer while the stylus is being used, the stylus communicating with the electronic device transmitting data therebetween relative to an identity verification, at least some of the data transmission between the first electronic device to the second electronic device being by radio frequency;
wherein access to the customer account is enabled when the sensed digital signature matches a reference digital signature.
1. A system for use by a customer to conduct a commercial transaction, the customer being registered and linked with an account for payment, the system comprising:
a. a host computer having access to data that links the customer with the customer account;
b. a first electronic device disposed at a point-of-sale terminal, the first electronic device being digitally linked to the host computer;
c. a second electronic device that is wireless, the wireless device being carried by the customer, the second electronic device communicating with the first electronic device transmitting data therebetween relative to an identity verification, radio frequency transmission being used for data transfer between the first electronic device and the second electronic device; and
d. a stylus having at least one sensor, the sensor capturing a digital signature of the customer while the stylus is being used;
wherein access to the customer account is enabled when the sensed digital signature matches a reference digital signature.
21. A method of enabling access to a secure area, the method comprising:
a. requesting identity verification through cooperative engagement between a first and a second electronic device, the first electronic device being disposed at a security checkpoint, the second electronic device being wireless, the second electronic device being carried by the customer, the first and second electronic devices being in digital communication with a host computer, the host computer having access to data that links at least one registered party to a reference digital signature;
b. using a stylus to submit written data pertinent to the identity verification, the stylus having a sensor that enables capture of a digital signature of a party during engagement of a finger of the party with the stylus;
c. transmitting data between the first electronic device and the second electronic device by radio frequency transmission; and
d. enabling access to the secure area when the sensed digital signature matches the reference digital signature.
15. A method of conducting a commercial transaction for payment at a point-of-sale terminal, the method comprising:
d. requesting identity verification through cooperative engagement between a first and a second electronic device, the first electronic device being disposed at the point-of-sale terminal, the second electronic device being wireless, the second electronic device being carried by the customer, the first and second electronic devices being in digital communication with a host computer, the host computer having access to data that links at least one registered party to a reference digital signature;
e. using a stylus to submit written data pertinent to the identity verification, the stylus having a sensor that enables capture of a digital signature of a party during engagement of a finger of the party with the stylus;
f. transmitting data between the first electronic device and the second electronic device by radio frequency transmission; and
d. enabling access to the customer account when the sensed digital signature matches the reference digital signature.
8. A system for use in regulating access to a secure area, the system including at least one pre-registered party who is permitted access to the secure area, the pre-registered party having previously submitted a reference digital signature, the system comprising:
a. a host computer that has access to data that links the registered party with the reference digital signature;
b. a first and a second electronic device, the first electronic device being disposed at a security check-point, the second electronic device being wireless, the second electronic device being carried by the customer, the first and second electronic devices being in communication with the host computer, radio frequency transmission being used for data transfer between the first electronic device and the second electronic device; and
c. a stylus having at least one sensor, the stylus being useful in preserving a log of access to the secure area, the sensor capturing a digital signature of a party during engagement of a finger of the party with the stylus;
wherein access to the secure area is enabled when the sensed digital signature matches the reference digital signature.
33. A system for use by a customer to conduct a commercial transaction, the customer being registered and digitally linked with an account for payment, the system comprising:
e. a host computer having access to data that links the customer with the customer account;
f. a first electronic device disposed at a point-of-sale terminal, the first electronic device being digitally linked to the host computer;
g. a second electronic device that is wireless, the wireless device being carried by the customer, the second electronic device communicating with the first electronic device transmitting data therebetween relative to an identity verification, radio frequency transmission being used for data transfer between the first electronic device and the second electronic device; and
h. a stylus having at least one fingerprint sensor thereon, the sensor being capable of capturing a digital signature of the customer while the stylus is being used;
wherein the stylus is graspable between a thumb and one or more fingers of the customer's hand with an identifying portion of a thumb or finger of the customer contacting said fingerprint sensor, and wherein the stylus has a tip portion configured for marking on a paper or digital surface; and
wherein access to the customer account is enabled when the sensed digital signature matches a reference digital signature.
2. The system of claim 1, wherein the digital signature is a fingerprint.
3. The system of claim 1, wherein the digital signature involves the capture of cells from the customer touching the sensor.
4. The system of claim 1, wherein the reference digital signature is disposed in the wireless device.
5. The system of claim 1, wherein the reference digital signature is disposed in a customer record, the customer record being accessible by the host computer.
6. The system of claim 1, wherein matching of the sensed print with the reference print occurs off-site.
7. The system of claim 1, wherein matching of the sensed print with the reference print occurs at a point-of-sale terminal.
9. The system of claim 8, wherein the digital signature is a fingerprint.
10. The system of claim 8, wherein the digital signature involves the capture of cells from the customer touching the sensor.
11. The system of claim 8, wherein the reference digital signature is disposed in memory within the wireless device.
12. The system of claim 8, wherein the reference digital signature is disposed in a customer record, the customer record being accessible through the host computer.
13. The system of claim 8, wherein comparison of the sensed print with the reference print occurs at a point-of-sale terminal.
14. The system of claim 8, wherein comparison of the sensed print with the reference print occurs at the security checkpoint.
16. The method of claim 15, wherein the digital signature is a fingerprint.
17. The method of claim 15, wherein the reference digital signature is disposed in the wireless electronic device.
18. The method of claim 15, wherein the reference digital signature is disposed in a customer record, the customer record being accessible by the host computer.
19. The method of claim 15, wherein matching of the sensed print with the reference print occurs at a point-of-sale terminal.
20. The method of claim 15, wherein matching of the sensed print with the reference print occurs at a point-of-sale terminal.
22. The method of claim 21, wherein the digital signature is a fingerprint.
23. The method of claim 21, wherein the reference digital signature is disposed in the wireless device.
24. The method of claim 21, wherein the reference digital signature is disposed in a customer record, the customer record being accessible by the host computer.
25. The method of claim 21, wherein comparison of the sensed print with the reference print occurs at the security checkpoint.
27. The system of claim 26, wherein the digital signature is a fingerprint.
28. The system of claim 26, wherein the digital signature involves the capture of cells from the customer touching the sensor.
29. The system of claim 26, wherein the reference digital signature is disposed in the wireless device.
30. The system of claim 26, wherein reference digital signature is disposed in a customer record, the customer record being accessible by the host computer.
31. The system of claim 26, wherein matching of the sensed print with the reference print occurs at a point-of-sale terminal.
32. The system of claim 26, wherein matching of the sensed print with the reference print occurs at a point-of-sale terminal.

The invention relates generally to various systems for verifying the identification of a person, and more particularly, where the person carries a radio-frequency identifier for use at point-of-sale terminals, and similar sites where a writing is used to either conduct a transaction or keep a written log of activities.

Many identification systems are known in the art. In some cases, a photograph of a subject or his fingerprint pattern is affixed to an identification card. In other approaches, various methods are employed for storing image or password information in a magnetic stripe or in an optically encoded image or pattern, which is physically part of the identification card. Still other approaches utilize a “smart card” having its own semiconductor memory capability for information storage.

While a written signature is still regarded as the preferred way for a person to convey approval and a legal commitment, there still remains a need to confirm absolutely that can assure that the person signing is the person authorized to make a commitment.

What is needed is a system that will utilize transponder technology (primarily) in commercial transactions of any value that is acceptable to all parties—that captures a digital signature (which is the international standard of identification) at the same time that the electronic signature (the written text) is captured, the combined signature being irrefutable; a pen-based system that is both compatible with card-based systems and independent of such systems; and a pen-based system that provides security in building access and enables data access and data entry upon positive identity verification.

The system of the present invention addresses these needs. A first preferred embodiment of the identity verification system of the present invention is for use in commercial transactions. The system comprises a host computer, an interrogation device, a transponder device, and a stylus.

The host computer has access to data that links the customer with the customer's payment account. The interrogator is linked to the host computer disposed at the point-of-sale terminal. The transponder is wireless and is carried by the customer, and transmits data to the interrogator upon request. The data transmitted pertains to the identity of the customer. The stylus is attached to the point-of-sale terminal and includes a sensor disposed in the stylus grip. The sensor captures a digital signature of the customer while the customer signs her name. Access to the customer's payment account is only enabled when the sensed digital signature matches a reference digital signature.

For use in commercial transactions at a point-of-sale terminal, a customer registers selecting a customer account that is to be used for payment. The customer also submits a digital signature for reference purposes—preferably, a fingerprint. The customer is then issued a transponder that links the customer to the customer account and to the reference digital signature. When the customer is at the point-of-sale terminal for making payment, an interrogator disposed at the point-of-sale terminal transmits a radio signal requesting identity verification. The wireless transponder submits data to the interrogator. Thereafter, when the customer uses a stylus to submit written data (such as a signature), a sensor in the stylus makes incidental capture of biometric data that enables the interrogator to confirm customer identity. Similarly, the system can be used to confirm identity when the customer wants to cash a personal check.

In another embodiment of the system of the present invention, the system is used to control access to a secure area. At a security checkpoint proximate to the secure area, a handwritten log is used to track access and egress to the secure area. Again, a transponder is issued to a party having authorized access after the party has registered and submitted a digital signature for reference purposes.

Positioned at the center of the process is a stylus with any of a number of biometric or with one or more metric sensors, that enable an incidental capture of data relative to identity verification while the stylus is being used. The identity verification processes of the present invention can be used at POS terminals, in various controlled environments, to access a computer network, in applications involving pen-based computers and smart-pens, for e-commerce, conventional writing implements, and multi-purpose writing implements.

While the systems set forth herein are described in conjunction with POS terminals for purposes of illustration, it is understood that the principles set forth herein are all applicable to a broad range of other activities where a writing or signature are required or preferred, such as Internet and Intranet commerce, access control, government activities (voting, drivers' registration, receipt of government benefits) and for use in controlled environments (such as hospitals, and banks).

PCT Application No. PCT/US99/17900 entitled “Identification Confirmation System” filed on Apr. 7, 1999; U.S. patent application Ser. No. 09/490,687, entitled “Writing Implement and Identity Verification Systems” filed on Jan. 24, 2000; U.S. patent application Ser. No. 09/535,411, entitled “Method for Identity Verification” filed on Mar. 20, 2000; and PCT Application No. PCT/US00/19652 entitled “Identity Authentication System and Method” filed Jul. 18, 2000 by the applicant disclose various systems and configurations for identity authentication using a combination of pen-based and card-based systems. As depicted herein, the systems include a card, a stylus including one or more fingerprint sensors for use with a signature pad. In one embodiment, the system comprises a stylus, a card with enhanced storage capacity, and a signature pad.

The identity verification systems of the present invention are variations of such systems and comprise a host computer, an interrogator, a wireless device carried by the user, and a stylus with at least one sensor that captures biometric properties of the user.

The interrogator is in digital communication with a host computer—the interrogator being disposed at a POS terminal or security checkpoint. The wireless device is preferably a transponder. The stylus can be attached to a POS terminal or a security checkpoint, via a pen-based computer or a signature pad. A digital signature, such as a fingerprint, is captured during a registration process and stored in a file associated with the registrant or in the wireless device.

The stylus includes one or more fingerprint sensor that captures an image of a finger of the customer when the stylus is grasped. While fingerprint sensors are used herein for purposes of illustration it is expressly understood that the principles of this invention are also applicable to sensing of DNA and other biotech properties—that involve cell capture or cell analysis sensors. During routine usage of the stylus, the sensor captures the data necessary to compare with the digital signature to determine identity verification.

As used herein unless the context indicates otherwise, a “stylus” is any device that is compatible with either the hand or finger of the user for purposes of making a marking on an essentially flat surface. The flat surface may be a digital surface or a piece of paper. While the drawings depict a conventional shape of a stylus, other shapes and designs are also included within the scope of the present invention such as any attachment or thimble-like device for a finger or any implement that can be held with a hand for such purpose. The stylus may or may not include an ink cartridge. Also, as used herein unless the context suggests otherwise, the term “fingerprint” refers to either the print of the thumb, index finger, or any other finger.

For a more complete understanding of the pen-based transponder identity verification systems of the present invention, reference is made to the following detailed description and accompanying drawings in which the presently preferred embodiments of the invention are shown by way of example. As the invention may be embodied in many forms without departing from spirit of essential characteristics thereof, it is expressly understood that the drawings are for purposes of illustration and description only, and are not intended as a definition of the limits of the invention. Throughout the description, like reference numbers refer to the same component throughout the several views.

FIG. 1A discloses the identity authentication system of the present invention, comprising a wireless transponder, an interrogator, a stylus, and a host computer;

FIG. 1B discloses the identity authentication system of the present invention, comprising an interrogator, a wireless stylus that serves as the transponder, and a host computer;

FIG. 1C discloses the identity authentication system of the present invention, comprising an interrogator, a wireless stylus that has enhanced memory, and a host computer;

FIG. 2A discloses a simplified logic diagram of a method of enrolling new customers into the identity authentication system of FIGS. 1A, 1B, or 1C;

FIG. 2B discloses a simplified logic diagram of a method of enrolling existing customers into the identity authentication system of FIGS. 1A, 1B, or 1C;

FIG. 3 discloses a simplified logic diagram for one method of making a purchase at a POS terminal using the wireless customer identity verification system of FIG. 5;

FIG. 4A discloses a simplified logic diagram for another method of registering an existing customer having a conventional bank account into a second embodiment of the pen-based identity verification system of the present invention as shown in FIG. 1A, 1B, or 1C, utilizing a registration processor, and a print processor for providing improved protection for access to fingerprint data of the customer;

FIG. 4B discloses a simplified logic diagram for another method of processing a commercial transaction at a POS terminal for the pen-based identity verification system of the present invention as shown in FIGS. 1A, 1B, or 1C, utilizing a registration processor, and a print processor for providing improved protection for access to fingerprint data of the customer (similar to FIG. 4A);

FIG. 5A discloses data including the reference print that may be included in the transponder carried by the customer for the identity verification system of the present invention;

FIG. 5B discloses data that may be included in the transponder carried by the customer, where the reference print is not included in the transponder data but rather the customer record for the identity verification system of the present invention;

FIG. 6A discloses a simplified customer bank record for use with the transponder data of FIG. 5A for the identity verification system of the present invention;

FIG. 6B discloses a simplified customer bank record for use with the transponder data of FIG. 5B for the identity verification system of the present invention;

FIG. 7 discloses a simplified block diagram for using the identity verification system of the present invention as shown in FIG. 1A, 1B, or 1C for confirming identity for cashing checks at a POS terminal;

FIG. 8 discloses a simplified block diagram for using the identity verification system of the present invention as shown in FIGS. 1A, 1B, or 1C for securing access to a restricted area;

FIGS. 9A and 9B disclose a first preferred embodiment of a stylus grip for use with the identity authentication system of the present invention, the stylus grip having a rotatable flap that includes a magnetic stripe that can be read by a conventional card reader;

FIGS. 9C and 9D disclose a second preferred embodiment of a stylus for use with the identity authentication system of the present invention, the stylus being unfoldable into a card-shaped device that includes a magnetic stripe that can be read by a conventional card reader, the device being compatible for carrying in the wallet of a customer;

FIG. 10B discloses another simplified logic diagram for making a purchase at a POS terminal using the wireless customer identity verification system of FIG. 5, the method including a check to confirm that the transponder is not a counterfeit or has been tampered with and also using a different referent reference print based upon the total amount of the transaction; and

FIG. 11 discloses yet another simplified logic diagram enabling an existing customer using a conventional credit card or transponder to register a reference fingerprint in her customer record during the processing of a conventional POS transaction where the stylus with the fingerprint sensor is used.

Referring now to the drawings, FIG. 1A discloses generally the identity verification system of the present invention. The system comprises a host computer, an interrogation device, a transponder device, and a stylus. Each system also comprises a host computer, a sensor positioned within a stylus used to generate a writing on a surface, an interrogator, and a wireless identifier (hereinafter referred to as a “transponder).

The preferred embodiment of the identity verification system of the present invention is for use in commercial transactions. The host computer has access to data that links the customer with the customer's payment account. The interrogator is linked to the host computer disposed at the point-of-sale terminal. The transponder is wireless and is carried by the customer, and transmits data to the interrogator upon request. The data transmitted pertains to the identity of the customer. The stylus is attached to the point-of-sale terminal and includes a sensor disposed in the stylus grip. The sensor captures a digital signature of the customer while the customer signs his name. Access to the customer's payment account is only enabled when the sensed digital signature matches a reference digital signature.

As used herein a “transponder” is a wireless device that is a receiver-transmitter—the device wilt generate a reply signal when a predefined signal is received. The transponder is carried by the customer and includes reference code embedded there—a card, a keytag, some other device that can be conveniently carried in a purse, wallet, keychain, or pocket. The transponder may be active or passive. The transponder can be part of a car key, a driver's license, or perhaps even a smart card.

FIGS. 2A and 2B disclose simplified methods for registration for new and existing customers, respectively. The primary difference in the two methods is that for the new customer, the customer record must be created. For the existing customer, the customer record is already in existence but a confirmation check is needed to confirm that the customer has authorized access to the account.

The stylus can be attached to a POS terminal, attached to a pen-based computer, or a signature pad. In addition, the stylus can be wireless, whereby the transponder is incorporated into the wireless stylus (see FIGS. 1B and 1C). Each stylus also includes one or more fingerprint sensors that capture an image of a finger of the customer when the stylus is grasped.

The transponder responds to a radio signal by emitting its own radio signal. Each transponder is tagged with a unique serial number. That serial number can be linked with a credit or debit account. A typical sale may proceed as follows (see FIG. 3). The customer selects goods and proceeds to a POS terminal. The POS terminal indicates that the transaction will be paid through a transponder. An interrogator disposed at the POS terminal collects data from the transponder. A light advises the customer that the payment has been accepted. Payment is made instantly from the customer's registered account.

In one preferred embodiment, the transponder has enhanced memory (akin to a smart card), in which case the encrypted reference fingerprint is stored within the transponder memory as shown in FIG. 5A. Also, the memory may contain account number, balance—and customer data to be stored in the transponder memory. FIG. 6A discloses the corresponding customer bank record. The comparison of the sensed print with the reference print for purposes of identity authentication preferably occurs in the transponder. One significant advantage to this system is that the complete transaction can be completed at the POS terminal with minimal access/input from the driver. Another advantage is that the driver and account data are updated after the transaction is completed

In another preferred embodiment, the transponder has limited memory (akin to a magnetic stripe). The writing device is a tethered stylus attached to the POS terminal and the reference print is stored in the customer record. The customer bank and account number are in the transponder (see FIG. 5B). The reference print is in the customer record at the customer bank (see FIG. 6B). The comparison of the sensed print with the reference print for purposes of identity authentication preferably occurs either in the driver (where the sensed print is transmitted) or in the POS terminal (where the reference print is transmitted). In a variation of this embodiment, the transponder has an index reference to the customer bank and account number. For increased security the index reference number in the account index and on the transponder change with each transaction. The reference print is in the customer record at the customer bank. One significant advantage is that since there is minimal information on the transponder device, if the transponder is lost or stolen it is of little use to thieves and hacks. While they can locate the customer's bank and account number (which they can learn from a personal check), they cannot gain access to such funds since the fingerprints don't match. Another advantage is that the transmission of data is through wired connections (more secure).

A passive transponder (does not include a power supply) carried by the customer on his/her person is disposed in a card carried in a wallet or on a keychain—it may need to be removed and swiped through a cardreader or a near an interrogator. An active transponder (includes a power supply) can also be pda, jewelry, glasses, clothing, or the like.

Another preferred embodiment of the identity verification system of the present invention is depicted in FIGS. 6A and 6B. For example in a branch office of a bank—a controlled environment, the pens of the present invention are placed at all tellers' windows, all ATM, and all officers' desks. New customers are given a debit/check/ATM card upon filling out an application. The customer uses a pen similar to the pens at the tellers' windows. The customer's reference print is captured during registration, preferably within a branch office of the bank and electronic fingerprint image that is encrypted is stored in the customer's bank record. Such cards can actually be issued and distributed to customers once registration is completed, much the same as hotels use to issue room keys upon registration—the cards are preprinted and certain data is loaded onto the card prior to issuance. FIG. 6C depicts a simplified logic diagram for using the system of FIGS. 6A and 6B at a POS terminal.

A transponder is commercially available from AMSKAN of Mulgrave, Victoria in Australia—the InfraRed Datalink allows serial “through the windscreen” data transfer between a vehicle and the roadside in daylight with high reliability and is presently used for capturing information from vehicles as they re-fuel, re-load, or at highway speeds. The IRD is comprised of two main components, the interrogator and the wireless transponder. The interrogator is mounted either at the POS terminal or at the security checkpoint. The size of the transponder is 130×80×50 mm.

Miotec's mPollux client is developed on a SIM card and its integrated security solutions offer a flexible and secure platform with a sufficient capacity for a wireless PKI system. The SIM platform is a FLASH microcontroller, which has a separate RISC processor for RSA operations. MioCOS operating system is compliant with both GSM and PKI standards. Furthermore, the integrated biometric functions enable, among other things, replacing the PIN code in an electronic ID card with fingerprint matching.

In still yet another preferred embodiment of the pen-based verification systems of the present invention, a transponder is used in a smart card. The smart is compatible with both contactless and contact transactions. Such a card is presently commercially available and known as a “Digital Pusan Card.” The Digital Pusan Card is one of the first to combine contact and contactless smart card functionality on a single chip. Supporting a wide array of services, it combines credit, debit and prepaid card functions. Compatible with smart pagers the card is used within the existing Hanaro Transportation scheme. Approximately 3,000 buses, 1,000 subway stations and 13,000 taxis are currently equipped with MIFARE®-based contactless readers and car travelers can benefit from 30 toll gates with contactless readers, as well as two parking facilities. Users can access 300,000 readers and 20,000 points of sate, as well as another 40,000 automatic vending machines. Cardholders can recharge their e-purses at 600 reloading machines and 500 ATMs. As well as proven and secure dual interface technology, operating in both contact and contactless mode. The card is loaded by either its contact or contactless interface. This allows many recharging possibilities including at bank terminals, bus stations or, with a PC and card reader, over the Internet—and this also permits electronic purchasing via the Internet.

The use of this transponder as a component of the pen-based verification system of the present invention enables the transponder to be compatible with both card-based and cardless systems. In the card-based system, the device is swiped through a cardreader at the POS terminal—and the customer signs her name using the fingerprint stylus. The reference fingerprint image is stored in the smart card/transponder device, which is also where the matching of the sensed print (from the pen) is compared with the reference fingerprint image. This embodiment enabling compatibility with both cardreaders and transponders also is key in enabling a transition to a cardless system.

FIGS. 8A, 8B, and 8C disclose a simplified logic diagram for a similar system of registering (FIG. 8A), making a purchase at a POS terminal (FIG. 8B), and converting from a card-based system to this pen-based and cardless system (FIG. 8C) for an existing customer. The existing customer has a conventional bank account and a card that has been issued with the customer's reference fingerprint stored therein. This embodiment uses a registration processor, a print processor, and an account processor for providing improved protection for access to fingerprint data of the customer. This system provides somewhat improved privacy for the customer, since the processor that compares the fingerprints is not the same processor that has access to the customer's account. This embodiment enables the customer to submit an identifier at a POS terminal (other than the account record number).

FIG. 9A discloses a simplified logic diagram for another method of registering an existing customer having a conventional bank account into a second embodiment of the pen-based (and cardless) customer identity verification system of the present invention—utilizing a registration processor, a print processor, and an account processor for providing improved protection for access to fingerprint data of the customer. FIG. 9B discloses a simplified logic diagram for another method of making a purchase at a POS terminal using the cardless customer identity verification system of the present invention. FIG. 9C discloses a simplified logic diagram for another method of converting from a card-based identification confirmation system to the pen-based customer identity confirmation system of the present invention.

Existing customers can use a “dynamic registration” during a routine transaction. A fingerprint is captured during a routine commercial transaction (see FIG. 11), using the stylus with a fingerprint sensor. Thereafter, during a commercial transaction, the sensed print is compared to the reference print as part of the identity verification process whenever the card is submitted through a cardreader. Similarly, if a transponder is used, perhaps to buy gasoline and other items in a convenience store affiliated with the gas station, the pen captures the fingerprint and uses it as a reference print. If the reference print is stored in the customer record (rather than the card or transponder), minimal additional memory is required in the card or transponder for the dynamic registration.

If the bank uses smart cards or smart transponders for such purposes (or a magnetic stripe card with sufficient storage capacity), “dynamic registration, as described above can also result in the reference print being placed on the card or transponder during routine usage for existing customers.

The systems of the present invention are also useful in any hotel to improve security involving on-site charging to a room. The principles of this invention are applicable to controlled environments other than resorts, hotel-casinos, hotels, and casinos. As used herein, unless the context suggests otherwise, a controlled environment is a community of people that: (1) requires registration to become a part of the community; and (2) where the purchase of goods or services occurs. Some examples of controlled environments include: hotels-resorts, luxury cruise liners, airports, banks, racetracks, bowling alleys, theme parks, hospitals, college campuses and public/private schools, military bases, hotel-casinos, sports complexes, shopping malls, and prisons. Once enrolled into the cardless transaction system of the present invention, any guest upon registration with the hotel complex has full and complete access to any amenity within the complex, at anytime, without carrying on his/her user anything other than biometric identification that is inherent in his/her being. As used herein a “controlled environment” does not require a single physical structure, but rather also includes a network of related activities administered by a centralized driver. Some examples of these type controlled environments include a bank and its customers, a regional of drugstores, health club facilities, restaurants, or beauty salons and their customers.

FIG. 8 discloses a simplified block diagram for using the identity verification system of the present invention as shown in FIGS. 1A, 1B, or 1C for securing access to a restricted area. Sometimes a written log of entry and egress are required for secure areas. If access is limited to employees or to persons to whom a transponder has been issued, the identity authentication system of the present invention provides a seamless way to confirm the identity of those persons entering through the security checkpoint.

The preferred embodiment of the identity verification system of the present invention is compatible with the following systems:

When wireless devices are used, system security becomes even more of a concern, since an integral part of the system, in this instance the transponder, is not attached to the system, but rather is portable and carried by a customer. FIG. 10 discloses a novel method of confirming that the fingerprint on the transponder has not been tampered with. The reference print is stored in both the transponder and the customer record. During a request for a POS transaction, a comparison of the reference print on the transponder with the reference print in the customer record is one way of identifying transponders that have been altered and counterfeit transponders. There are other ways. When the reference print is stored inside a transponder that is carried by the customer, either of the following technologies may also be employed:

Registration can also occur without the pen, but rather with a fingerprint that captures essentially a complete fingerprint of the finger for references purposes. Subsequently, when the pen is used, the partial print is compared to the complete fingerprint for matching purposes.

Just as a transponder that is compatible with existing cardreaders enables the system of the present invention to be compatible with card-based systems and pen-based (cardless) systems as shown above, utilization of a pen that is compatible with existing cardreaders offers many similar advantages for a wireless stylus, that is compatible with card-based systems and pen-based systems. FIGS. 9A and 9B disclose a first preferred embodiment of a stylus grip for use with the identity authentication system of the present invention, the grip having a rotatable flap that includes a magnetic stripe that can be read by a conventional card reader. FIGS. 9C and 9D disclose a second preferred embodiment of a stylus for use with the identity authentication system of the present invention, the stylus being unfoldable into a card-shaped device that includes a magnetic stripe that can be read by a conventional card reader, the device being compatible for carrying in the wallet of a customer.

Employing the pen-based systems of the present invention will be initially implemented in controlled environments, generally where registration occurs on-site using the stylus with the fingerprint sensors—for example, a hotel or resort. The principles of this invention are applicable to controlled environments other than resorts, and hotels. As used herein, unless the context suggests otherwise, a controlled environment is a community of people that: (1) requires registration to become a part of the community; and (2) where the purchase of goods or services occurs. Some examples of controlled environments include: hotels-resorts, luxury cruise liners, airports, banks, racetracks, bowling alleys, theme parks, hospitals, college campuses and public/private schools, military bases, hotel-casinos, sports complexes, shopping malls, and prisons. Once enrolled into the cardless transaction system of the present invention, any guest upon registration with the hotel complex has full and complete access to any amenity within the complex, at anytime, without carrying on his/her user anything other than biometric identification that is inherent in his/her being. As used herein a “controlled environment” does not require a single physical structure, but rather includes a network of related activities administered by a centralized driver. Some examples of these type controlled environments include a bank and its customers, a regional of drugstores, health club facilities, restaurants, or beauty salons and their customers.

Throughout this application, various U.S. Patents, Patent Applications, and PCT Applications are referenced by number and inventor. The disclosures of these Patents and Applications in their entireties are hereby incorporated by reference into this specification in order to more fully describe the state of the art to which this technology pertains.

It is evident that many alternatives, modifications, and variations of the pen-based transponder identity verification systems of the present invention will be apparent to those skilled in the art in light of the disclosure herein. It is intended that the metes and bounds of the present invention be determined by the appended claims rather than by the language of the above specification, and that all such alternatives, modifications, and variations which form a conjointly cooperative equivalent are intended to be included within the spirit and scope of these claims.

Black, Gerald R.

Patent Priority Assignee Title
10019725, Sep 22 2014 Capital One Financial Corporation Systems and methods for providing offers using a mobile device
10037528, Jan 23 2015 TACTILIS PTE LIMITED Biometric device utilizing finger sequence for authentication
10083434, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
10147091, Feb 06 2015 TACTILIS PTE LIMITED Smart card systems and methods utilizing multiple ATR messages
10147100, Nov 17 2006 Capital One Financial Corporation System and method of notifying user near point of sale location of available rewards at the point of sale location
10163123, Sep 22 2014 Capital One Services, LLC Systems and methods for providing offers using a mobile device
10223555, Jan 14 2015 TACTILIS PTE LIMITED Smart card systems comprising a card and a carrier
10223704, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
10229408, Mar 20 2015 TACTILIS PTE LIMITED System and method for selectively initiating biometric authentication for enhanced security of access control transactions
10275768, Mar 20 2015 TACTILIS PTE LIMITED System and method for selectively initiating biometric authentication for enhanced security of financial transactions
10339557, Sep 22 2014 Capital One Services, LLC Systems and methods for providing offers using a mobile device
10395227, Jan 14 2015 TACTILIS PTE LIMITED System and method for reconciling electronic transaction records for enhanced security
10445750, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
10510064, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
10540861, Dec 20 2007 CITIBANK, N A Sustained authentication of a customer in a physical environment
10607249, Sep 22 2014 Capital One Services, LLC Systems and methods for providing offers using a mobile device
10748160, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
10839388, Jul 10 2001 Liberty Peak Ventures, LLC Funding a radio frequency device transaction
11449878, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
7053771, Mar 26 2002 VIVO MOBILE COMMUNICATION CO , LTD Apparatus, method and system for authentication
7124937, Jan 21 2005 VISA U S A INC Wireless payment methods and systems
7281135, May 25 2001 UNITED STATES CP, LLC Pen-based transponder identity verification system
7303120, Jul 10 2001 Liberty Peak Ventures, LLC System for biometric security using a FOB
7314164, Jul 01 2004 Liberty Peak Ventures, LLC System for biometric security using a smartcard
7314165, Jul 01 2004 Liberty Peak Ventures, LLC Method and system for smellprint recognition biometrics on a smartcard
7318550, Jul 01 2004 Liberty Peak Ventures, LLC Biometric safeguard method for use with a smartcard
7325724, Jul 01 2004 Liberty Peak Ventures, LLC Method for registering a biometric for use with a smartcard
7341181, Jul 01 2004 Liberty Peak Ventures, LLC Method for biometric security using a smartcard
7360689, Jul 10 2001 Liberty Peak Ventures, LLC Method and system for proffering multiple biometrics for use with a FOB
7363504, Jul 01 2004 Liberty Peak Ventures, LLC Method and system for keystroke scan recognition biometrics on a smartcard
7363505, Dec 03 2003 UNITED STATES CP, LLC Security authentication method and system
7406368, Jun 26 2003 ARNOUSE DIGITAL DEVICES CORP Apparatus, system and method for aircraft security and anti-hijacking intervention
7407094, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
7426643, Jun 22 2004 Hewlett-Packard Development Company, L.P. Input device feature
7438234, Jul 01 2004 Liberty Peak Ventures, LLC System for biometric security using a smartcard
7445149, Jul 01 2004 Liberty Peak Ventures, LLC System for biometric security using a smartcard
7451924, Jul 01 2004 Liberty Peak Ventures, LLC System for biometric security using a smartcard
7451925, Jul 01 2004 Liberty Peak Ventures, LLC System for biometric security using a smartcard
7494058, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using voiceprint recognition
7497375, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using smellprint recognition
7500616, Jul 10 2001 Liberty Peak Ventures, LLC Authenticating fingerprints for radio frequency payment transactions
7505941, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions using biometrics
7506806, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using fingerprint recognition
7506818, Jul 10 2001 Liberty Peak Ventures, LLC Biometrics for radio frequency payment transactions
7506819, Jul 10 2001 Liberty Peak Ventures, LLC Biometric security using a fob
7510115, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using auditory scan recognition
7523860, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using facial scan recognition
7530493, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using iris scan recognition
7533827, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using signature recognition
7543738, Jul 10 2001 Liberty Peak Ventures, LLC System and method for secure transactions manageable by a transaction account provider
7578448, Jul 10 2001 Liberty Peak Ventures, LLC Authorizing radio frequency transactions using a keystroke scan
7594612, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction method and system using retinal scan recognition
7597265, Jul 01 2004 Liberty Peak Ventures, LLC Method and system for vascular scan recognition with a smartcard
7609862, Jan 24 2000 UNITED STATES CP, LLC Method for identity verification
7609863, May 25 2001 UNITED STATES CP, LLC Identify authentication device
7637434, Jul 10 2001 Liberty Peak Ventures, LLC Registering a biometric for radio frequency transactions
7639116, Jul 10 2001 Liberty Peak Ventures, LLC Converting account data associated with a radio frequency device
7650314, May 25 2001 Liberty Peak Ventures, LLC System and method for securing a recurrent billing transaction
7668750, Jul 10 2001 Liberty Peak Ventures, LLC Securing RF transactions using a transactions counter
7672512, Mar 18 2005 The Invention Science Fund I, LLC Forms for completion with an electronic writing device
7690577, Jul 10 2001 Liberty Peak Ventures, LLC Registering a biometric for radio frequency transactions
7717329, Feb 16 2006 Bank of America Corporation Check carrier
7725427, May 25 2001 Liberty Peak Ventures, LLC Recurrent billing maintenance with radio frequency payment devices
7746215, Jul 10 2001 Liberty Peak Ventures, LLC RF transactions using a wireless reader grid
7760191, Mar 18 2005 The Invention Science Fund I, LLC Handwriting regions keyed to a data receptor
7780091, Jul 10 2001 Liberty Peak Ventures, LLC Registering a biometric for radio frequency transactions
7791593, Mar 18 2005 The Invention Science Fund I, LLC Machine-differentiatable identifiers having a commonly accepted meaning
7793845, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction system and method
7809215, Oct 11 2006 The Invention Science Fund I, LLC Contextual information encoded in a formed expression
7813597, Mar 18 2005 The Invention Science Fund I, LLC Information encoded in an expression
7814332, Jul 10 2001 Liberty Peak Ventures, LLC Voiceprint biometrics on a payment device
7822232, Sep 17 1999 UNITED STATES CP, LLC Data security system
7826687, Mar 18 2005 The Invention Science Fund I, LLC Including contextual information with a formed expression
7837116, Sep 07 1999 Liberty Peak Ventures, LLC Transaction card
7873243, Mar 18 2005 The Invention Science Fund I, LLC Decoding digital information included in a hand-formed expression
7886157, Jul 10 2001 Liberty Peak Ventures, LLC Hand geometry recognition biometrics on a fob
7889052, Jul 10 2001 Liberty Peak Ventures, LLC Authorizing payment subsequent to RF transactions
7934639, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
7961917, Apr 11 2005 UNITED STATES CP, LLC Method for identity verification
7988038, Jul 10 2001 Liberty Peak Ventures, LLC System for biometric security using a fob
8001054, Jul 10 2001 Liberty Peak Ventures, LLC System and method for generating an unpredictable number using a seeded algorithm
8009018, Jul 10 2001 Liberty Peak Ventures, LLC RF transactions using a wireless reader grid
8016191, Jul 01 2004 Liberty Peak Ventures, LLC Smartcard transaction system and method
8016201, Jul 10 2001 Liberty Peak Ventures, LLC Authorized sample receiver
8049594, Nov 30 2004 QUALCOMM FYX, INC Enhanced RFID instrument security
8066181, Jul 10 2001 Liberty Peak Ventures, LLC RF transaction authentication using a random number
8074889, Jul 10 2001 Liberty Peak Ventures, LLC System for biometric security using a fob
8085126, Jul 27 2004 Honeywell International Inc Identification with RFID asset locator for entry authorization
8096468, Jan 21 2005 Visa U.S.A. Inc. Wireless portable consumer electronics device facilitating multi-range transactions
8102383, Mar 18 2005 The Invention Science Fund I, LLC Performing an action with respect to a hand-formed expression
8191788, Sep 07 1999 Liberty Peak Ventures, LLC Transaction card
8205794, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
8214299, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
8229252, Mar 18 2005 The Invention Science Fund I, LLC Electronic association of a user expression and a context of the expression
8232979, May 25 2005 Invention Science Fund I, LLC Performing an action with respect to hand-formed expression
8244074, Mar 18 2005 The Invention Science Fund I, LLC Electronic acquisition of a hand formed expression and a context of the expression
8264321, Nov 30 2004 QUALCOMM FYX, INC System and method for enhanced RFID instrument security
8272564, Feb 16 2006 Bank of America Corporation Check carrier
8279042, Jul 10 2001 Liberty Peak Ventures, LLC Iris scan biometrics on a payment device
8284025, Jul 10 2001 Liberty Peak Ventures, LLC Method and system for auditory recognition biometrics on a FOB
8289136, Jul 10 2001 Liberty Peak Ventures, LLC Hand geometry biometrics on a payment device
8290313, Mar 18 2005 The Invention Science Fund I, LLC Electronic acquisition of a hand formed expression and a context of the expression
8294552, Jul 10 2001 Liberty Peak Ventures, LLC Facial scan biometrics on a payment device
8300943, Mar 18 2005 The Invention Science Fund I, LLC Forms for completion with an electronic writing device
8320562, Apr 10 2006 Digital Lobe, LLC Methods for creating secret keys based upon one or more shared characteristics and systems thereof
8340476, Mar 18 2005 The Invention Science Fund I, LLC Electronic acquisition of a hand formed expression and a context of the expression
8374402, Sep 17 1999 UNITED STATES CP, LLC Data security system
8418918, Jul 10 2001 Liberty Peak Ventures, LLC System and method for secure transactions manageable by a transaction account provider
8423476, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
8433658, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
8489513, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
8520905, Sep 17 1999 UNITED STATES CP, LLC Data security system
8548927, Jul 10 2001 Liberty Peak Ventures, LLC Biometric registration for facilitating an RF transaction
8567671, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
8599174, Mar 18 2005 The Invention Science Fund I, LLC Verifying a written expression
8635165, Jul 10 2001 Liberty Peak Ventures, LLC Biometric authorization of an RF transaction
8640959, Mar 18 2005 The Invention Science Fund I, LLC Acquisition of a user expression and a context of the expression
8698595, Nov 30 2004 QUALCOMM FYX, INC System and method for enhanced RFID instrument security
8749480, Mar 18 2005 The Invention Science Fund I, LLC Article having a writing portion and preformed identifiers
8787706, Mar 18 2005 The Invention Science Fund I, LLC Acquisition of a user expression and an environment of the expression
8818907, Mar 07 2000 Liberty Peak Ventures, LLC Limiting access to account information during a radio frequency transaction
8823636, Mar 18 2005 The Invention Science Fund I, LLC Including environmental information in a manual expression
8872619, Jul 10 2001 Liberty Peak Ventures, LLC Securing a transaction between a transponder and a reader
8897605, Mar 18 2005 The Invention Science Fund I, LLC Decoding digital information included in a hand-formed expression
8924310, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
8928632, Mar 18 2005 The Invention Science Fund I, LLC Handwriting regions keyed to a data receptor
8938402, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
9024719, Jul 10 2001 Liberty Peak Ventures, LLC RF transaction system and method for storing user personal data
9031880, Jul 10 2001 Liberty Peak Ventures, LLC Systems and methods for non-traditional payment using biometric data
9042608, Oct 25 2010 UNITED STATES CP, LLC Data security system
9129453, Jul 10 2001 Liberty Peak Ventures, LLC DNA sample data in a transponder transaction
9262655, Nov 30 2004 QUALCOMM FYX, INC. System and method for enhanced RFID instrument security
9336634, Jul 10 2001 Liberty Peak Ventures, LLC Hand geometry biometrics on a payment device
9454752, Jul 10 2001 Liberty Peak Ventures, LLC Reload protocol at a transaction processing entity
9519894, Aug 31 1999 Liberty Peak Ventures, LLC Methods and apparatus for conducting electronic transactions
9558504, Sep 22 2014 Capital One Financial Corporation Systems and methods for providing offers using a mobile device
9607189, Jan 14 2015 TACTILIS PTE LIMITED Smart card system comprising a card and a carrier
9741052, Sep 22 2014 Capital One Financial Corporation Systems and methods for providing offers using a mobile device
9754267, Nov 17 2006 Capital One Services, LLC System and method of notifying user near point of sale location of available rewards at the point of sale location
9760882, Jan 21 2005 Visa U.S.A. Inc. Wireless payment method and systems
9785963, Sep 22 2014 Capital One Financial Corporation Systems and methods for providing offers using a mobile device
9881294, Jul 10 2001 Liberty Peak Ventures, LLC RF payment via a mobile device
9886692, Jul 10 2001 Liberty Peak Ventures, LLC Securing a transaction between a transponder and a reader
RE43157, Sep 12 2002 Liberty Peak Ventures, LLC System and method for reassociating an account number to another transaction account
RE43460, Jan 21 2000 Liberty Peak Ventures, LLC Public/private dual card system and method
RE45416, Jul 10 2001 Liberty Peak Ventures, LLC Processing an RF transaction using a routing number
RE45615, Jul 10 2001 Liberty Peak Ventures, LLC RF transaction device
Patent Priority Assignee Title
5353350, Oct 03 1989 University of Technology, Sydney Electro-active cradle circuits for the detection of access or penetration
5677955, Apr 07 1995 FleetBoston Financial Corporation Electronic funds transfer instruments
5982891, Feb 13 1995 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
6128602, Oct 27 1997 BANK OF AMERICA CORP Open-architecture system for real-time consolidation of information from multiple financial systems
6164528, Dec 31 1996 LML PATENT CORP Check writing point of sale system
6193152, May 09 1997 Symbol Technologies, Inc Modular signature and data-capture system and point of transaction payment and reward system
6237786, Feb 13 1995 INTERTRUST TECHNOLOGIES CORP Systems and methods for secure transaction management and electronic rights protection
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
May 25 2001Pen-One, Inc(assignment on the face of the patent)
Oct 05 2006BLACK, GERALD R PEN ONE, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0183980027 pdf
Sep 08 2009BLACK, GERALD R Pen-One IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0232200541 pdf
Nov 30 2016Pen-One, IncPen-One Acquisition Group, LLCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0415080648 pdf
Oct 10 2020Pen-One Acquisition Group, LLCUNITED STATES CP, LLCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0541800218 pdf
Date Maintenance Fee Events
Feb 03 2009M2551: Payment of Maintenance Fee, 4th Yr, Small Entity.
Feb 03 2009M2554: Surcharge for late Payment, Small Entity.
Feb 09 2009REM: Maintenance Fee Reminder Mailed.
Jan 30 2013M2552: Payment of Maintenance Fee, 8th Yr, Small Entity.
Mar 10 2017REM: Maintenance Fee Reminder Mailed.
Aug 28 2017EXP: Patent Expired for Failure to Pay Maintenance Fees.


Date Maintenance Schedule
Aug 02 20084 years fee payment window open
Feb 02 20096 months grace period start (w surcharge)
Aug 02 2009patent expiry (for year 4)
Aug 02 20112 years to revive unintentionally abandoned end. (for year 4)
Aug 02 20128 years fee payment window open
Feb 02 20136 months grace period start (w surcharge)
Aug 02 2013patent expiry (for year 8)
Aug 02 20152 years to revive unintentionally abandoned end. (for year 8)
Aug 02 201612 years fee payment window open
Feb 02 20176 months grace period start (w surcharge)
Aug 02 2017patent expiry (for year 12)
Aug 02 20192 years to revive unintentionally abandoned end. (for year 12)